
Maxtrain.com - info@maxtrain.com - 513-322-8888 - 866-595-6863
Certified Security Principles
Description
The Certified Security Sentinel certification course is intended for anyone that uses a computer on the internet. Attendees will fully understand the security threats that attack daily and countermeasures associated with these attacks. The weakest link in any companies’ security program is a poorly trained employee. Don`t let this be you. Once a student understands what can happen, they will know what to look for. And with that understanding, be able to keep the information they have been entrusted with as safe as possible.
The social engineering portion of the class is designed to teach the participants the skills used by social engineers to facilitate the extraction of information from an organization using technical and non-technical methods. Computer fraud, black-hat hacking, and cyber-terrorism are all phrases that describe crimes that use over-the-wire technology to attack, steal, and terrorize their victims. The key to most of these over-the-wire attacks being successful is information they receive through social engineering. Does it work? Can smart people be easily deceived? Kevin Mitnick, who served five years in prison for repeated hacking said in testimony before Congress on the subject of Social Engineering: “I was so successful with that attack that I rarely had to resort to a technical attack.” If you’re afraid of having your identity, credit card credentials, or business information compromised, then this is the training you have been looking for.
The 2 day instructor-led Certified Security Sentinel certification course trains students on how attacks are performed, how to identify an attack, and how to secure information. One of the most valuable skill sets of a C)SS is that they understand how to train others on security as well.
Upon Completion
Students will:
- Understand security best practices on how to keep information secure
- Have knowledge to identify a security breach
- Be ready to sit for the C)SS Exam
With 11 up-to-date Modules, the Certified Security Sentinel will teach you security best practices applicable to keeping the information you are entrusted with secure.
Outline
- What are the Risks?
- Known Risks
- Did You Know?
- What are the Risks?
- Things you NEED to know!
- The “Hacker”
- What is Identity Theft?
- Fighting Identity Theft
- Practice
- Demo
- Don`t Panic!
- Overview
- User Attacks
- User Awareness
- Passwords
- Generating Passwords
- Keeping Track Of Passwords
- eWallet
- Encryption Tools
- Other Password Options
- Windows Administrator Account
- Demo
- Windows Processes
- Task Manager
- Processes Tab
- Searching Processes
- Web Research
- Process Information
- Bad Processes
- Removing Suspect Processes
- Start-Up Tuners
- Downloads
- The User
- E-Mail Links
- Demo
- Overview
- Internet Protection Solutions
- Choosing a Package
- Free Anti-Virus & Spyware
- Free Anti-Malware & Anti Spyware
- Updating
- Scheduling a Scan?
- Demo
- Patch Management
- Demo
- Internet Anonymizers
- How They Work
- Demo
- Why Are You Here?
- The Employer`s Liability
- Steps to an Effective Security Program
- Starting at the Top
- Why This All Matters
- Areas of Concern
- What`s In This For Me?
- Course Format
- Module Objectives
- Why Can`t I Just Do What I Want?
- Internet Acceptable Use Policy
- The Internet at Work
- Internet Basics
- Internet Threats
- Internet Access
- Your Web Browser
- ActiveX & Java
- Media Files
- Chat
- Web Storage
- Web Proxies
- P2P
- Spyware
- Countermeasures
- Demo
- Module Objectives
- What`s a LAN?
- Logging In
- Installing Applications
- OS Utilities
- Network Drives
- Sharing
- Removable Storage
- Email Attachments
- Virus Scanner
- Management Software
- Monitoring
- Demos
- Module Objectives
- Work from Home
- Your Home PC
- From Your House to Work
- Wireless
- Hot Spots
- Web Access for Email
- Profile Management
- VPNs
- Demo
- Outline
- Introduction
- How are People Motivated?
- Avoiding Pain
- Pursuing Pleasure
- Baselining
- How to Read a Person
- Body Movements
- What About Over the Phone?
- Re-Framing
- Putting on the Right “Spin”
- Marketing
- Alter Perceptions of Pain or Pleasure
- Saving-Face
- Verbal Judo
- Putting It All Together
- Practice
- Summary
- Outline
- Introduction
- Google Hacks
- Google Hacks Continued
- Other Research Techniques
- Dumpster Diving
- Email Addresses
- Current SOPs
- Vendor Agreements
- Inter-Office Memos
- Shoulder Surfing
- Eavesdropping
- Telephone Calls
- Cubicles/Office Areas
- Restaurants and Bars
- Job Descriptions
- Conclusion
- Outline
- Introduction
- Impersonation in Person
- The Job Interview
- The Inspector
- Delivery Person
- Vendors/Contractors
- Impersonation on the Phone
- Help Desk
- IT Staff
- Asking for Help
- Summary
- NMAP TCP Connect Scan
- TCP Connect Port Scan
- Nmap (cont.)
- Tool Practice : TCP half-open & Ping Scan
- Half-open Scan
- Firewalled Ports
- NMAP Service Version Detection
- Additional NMAP Scans
- NMAP UDP Scans
- UDP Port Scan
- Null Sessions
- Syntax for a Null Session
- SMB Null Sessions & Hardcoded Named Pipes
- Windows Networking Services Countermeasures
- Review
PreRequisites
- An interest in security
- Basic Computer Experience
Audience
The C)SS is a course on cyber security designed for those who don't know anything about security but need to. We recommend this course for anyone who wants to be secure on the Internet, especially employees at work.
After you complete the C)SS course and get certified, we recommend you to further develop your security skill-set by being certified as a Certified Information Systems Officer, which will prepare you to advise businesses on security issues and implement solutions.
$3000.00
|
5 Days Course |